✔️ Understanding a historical vulnerability

✔️ Null sessions can be found on legacy systems

✔️ Deepening your understanding of Windows Shares

Null session attacks can be used to steal a lot of information

Attackers steal info about:

→ remotely exploitable

this attack can be used to call:

These days Windows is immune to this attack, however, legacy hosts can still be vulnerable

1️⃣ Enumerating Windows Shares

first step in exploiting a Windows machine vulnerable to Null Sessions

we will use both Windows and Linux tools for this step.

🟦 nbtstat

most common command for enumerating Windows Shares

command line tool to display information about a target

nbtstat /? to see how to use it

Use case:

most commonly used to display information about a target with:

nbtstat -A <IP>

> nbtstat -A 10.130.40.80